咨询与建议

限定检索结果

文献类型

  • 3,952 篇 会议
  • 3,678 篇 期刊文献
  • 101 册 图书

馆藏范围

  • 7,731 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,739 篇 工学
    • 2,830 篇 计算机科学与技术...
    • 2,299 篇 软件工程
    • 872 篇 信息与通信工程
    • 668 篇 控制科学与工程
    • 587 篇 电气工程
    • 571 篇 生物工程
    • 504 篇 生物医学工程(可授...
    • 493 篇 电子科学与技术(可...
    • 444 篇 光学工程
    • 399 篇 化学工程与技术
    • 383 篇 机械工程
    • 365 篇 仪器科学与技术
    • 309 篇 材料科学与工程(可...
    • 290 篇 动力工程及工程热...
    • 182 篇 环境科学与工程(可...
    • 176 篇 安全科学与工程
  • 3,055 篇 理学
    • 1,329 篇 物理学
    • 1,144 篇 数学
    • 670 篇 生物学
    • 422 篇 化学
    • 391 篇 统计学(可授理学、...
    • 263 篇 系统科学
    • 254 篇 地球物理学
  • 1,172 篇 管理学
    • 775 篇 管理科学与工程(可...
    • 403 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 580 篇 医学
    • 487 篇 临床医学
    • 401 篇 基础医学(可授医学...
    • 242 篇 药学(可授医学、理...
    • 239 篇 公共卫生与预防医...
  • 204 篇 法学
  • 160 篇 经济学
  • 137 篇 农学
  • 128 篇 教育学
  • 23 篇 艺术学
  • 21 篇 军事学
  • 17 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 229 篇 deep learning
  • 220 篇 machine learning
  • 183 篇 accuracy
  • 159 篇 feature extracti...
  • 130 篇 internet of thin...
  • 129 篇 computational mo...
  • 122 篇 artificial intel...
  • 120 篇 real-time system...
  • 106 篇 predictive model...
  • 106 篇 training
  • 82 篇 security
  • 81 篇 support vector m...
  • 78 篇 optimization
  • 75 篇 convolutional ne...
  • 72 篇 monitoring
  • 72 篇 data models
  • 71 篇 neural networks
  • 70 篇 semantics
  • 69 篇 cloud computing
  • 67 篇 covid-19

机构

  • 110 篇 university of sc...
  • 96 篇 tianfu cosmic ra...
  • 94 篇 institut univers...
  • 93 篇 north-west unive...
  • 91 篇 hebei normal uni...
  • 90 篇 department of ph...
  • 90 篇 national centre ...
  • 87 篇 infn sezione di ...
  • 87 篇 state key labora...
  • 85 篇 yunnan observato...
  • 84 篇 tno technical sc...
  • 80 篇 université de st...
  • 79 篇 infn sezione di ...
  • 79 篇 nikhef national ...
  • 75 篇 university of jo...
  • 73 篇 key laboratory f...
  • 72 篇 ncsr demokritos ...
  • 68 篇 university würzb...
  • 66 篇 università di ca...
  • 63 篇 university moham...

作者

  • 113 篇 bastieri d.
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 chen a.
  • 94 篇 calvo d.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 díaz a.f.
  • 83 篇 gozzini s.r.
  • 82 篇 boumaaza j.
  • 82 篇 coleiro a.
  • 80 篇 dallier r.
  • 76 篇 enzenhöfer a.
  • 75 篇 axikegu
  • 75 篇 boettcher m.
  • 73 篇 fang j.
  • 73 篇 feng c.f.
  • 69 篇 jiang k.
  • 69 篇 kalekin o.
  • 69 篇 celli s.

语言

  • 6,660 篇 英文
  • 1,016 篇 其他
  • 56 篇 中文
  • 6 篇 德文
  • 3 篇 法文
  • 3 篇 日文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
检索条件"机构=Faculty of Computing Engineering and Science"
7731 条 记 录,以下是671-680 订阅
排序:
Drone-Based Public Surveillance Using 3D Point Clouds and Neuro-Fuzzy Classifier
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 4759-4776页
作者: Yawar Abbas Aisha Ahmed Alarfaj Ebtisam Abdullah Alabdulqader Asaad Algarni Ahmad Jalal Hui Liu Faculty of Computing and AI Air UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Department of Computer Sciences Faculty of Computing and Information TechnologyNorthern Border UniversityRafha91911Saudi Arabia Department of Computer Science and Engineering College of InformaticsKorea UniversitySeoul02841Republic of Korea Cognitive Systems Lab University of BremenBremen28359Germany
Human Activity Recognition(HAR)in drone-captured videos has become popular because of the interest in various fields such as video surveillance,sports analysis,and human-robot ***,recognizing actions from such videos ... 详细信息
来源: 评论
Algorithmic Trading Model for Stock Price Forecasting Integrating Forester with Golden Ratio Strategy  12
Algorithmic Trading Model for Stock Price Forecasting Integr...
收藏 引用
12th IEEE Region 10 Humanitarian Technology Conference, R10-HTC 2024
作者: Govindan, Niranjana Baskaran, Bharathi Azizan, Azizul Yakub, Fitri Dhamanti, Inge Dhaya, C. SRMIST Faculty of Engineering & Technology Department of Computing Technologies Kattankulathur Chennai India Faculty of Intelligence Kuala Lumpur Malaysia Malaysia-Japan International Institute of Technology UTM Electronic System Engineering Department Kuala Lumpur Malaysia Universitas Airlangga Faculty of Public Health Department of Health Policy and Administration Surabaya Indonesia Adhiparasakthi Engineering College Department of Computer Science and Technology Melmaruvathur India
Algorithmic trading has emerged as a powerful tool for making data-driven trading decisions in financial markets. In this paper, we present an innovative algorithmic trading model for stock price forecasting that inte... 详细信息
来源: 评论
Design and Implementation of a Novel Image Encryption System  8
Design and Implementation of a Novel Image Encryption System
收藏 引用
8th International Conference on Intelligent computing and Signal Processing, ICSP 2023
作者: Chen, Enhao Shu, Yingying Chen, Zongwei Wang, Xinru Nie, Xin Gao, Shuyi Liu, Zongrui Zou, Yijia Harbin Institute of Technology Faculty of Computing Harbin China Harbin Institute of Technology Faculty of Materials Science and Engineering Harbin China Harbin Institute of Technology Faculty of Science Harbin China Harbin Institute of Technology Faculty of New Energy Harbin China Harbin Institute of Technology School of Economics and Management Harbin China
The field of image encryption is studied to encrypt and hide the image effectively, and the most critical thing is whether the image can be restored without any loss of details or distortion. Classical cryptography pr... 详细信息
来源: 评论
Enhanced Sensing for Automotive mmWave Radar: Super-Resolution Range and Angle Estimation With Coherent Extension and Advanced IAA
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Wu, Zhenyu Ma, Xuxu Chang, Fei Li, Chuandong Luo, Zhen Leung, Man-Fai Southwest University College of Electronic and Information Engineering Chongqing400715 China Anglia Ruskin University School of Computing and Information Science Faculty of Science and Engineering Cambridge United Kingdom
This article delves into the super-resolution problem of range and angle for millimeter wave (mmWave) frequency-modulated continuous wave radar. First, a modified diagonal loading (MDL) is proposed for range estimatio... 详细信息
来源: 评论
Maternal Health Risk Classification - A Comparison between Algorithm Decision Tree and k-Nearest Neighbor (kNN)
Maternal Health Risk Classification - A Comparison between A...
收藏 引用
2023 International Conference on Sustainable Emerging Innovations in engineering and Technology, ICSEIET 2023
作者: Fatmawati, Maylia Novita, Mega Saputro, Nugroho Dwi Chauhan, Alok Singh Nada, Noora Qotrun Sinha, Amit Herlambang, Bambang Agus Gupta, Shruti Universitas Pgri Semarang Faculty of Engineering and Informatics Department of Informatics Semarang Indonesia Universitas Pgri Semarang Postgraduate Program of Science Education Semarang Indonesia School of Computing Science & Engineering Galgotias University Greater Noida India ABES Engineering College Department of Computer Science & Engineering Uttar Pradesh Ghaziabad201009 India
Maternal health is a critical concern, particularly for individuals who are pregnant and will shape the future generations. However, not all expectant mothers receive tailored attention and care for their unique healt... 详细信息
来源: 评论
Fully Automated WSI with CNN Model for Breast Cancer Prediction using Deep Learning  3
Fully Automated WSI with CNN Model for Breast Cancer Predict...
收藏 引用
3rd International Conference on Ubiquitous computing and Intelligent Information Systems, ICUIS 2023
作者: Rama, P. Angayarkanni, V. Vidhyalakshmi, M.K. Karuppiah, A. Babu Premalatha, J. College of Engineering and Technology Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Computing Technologies TN Kattankulathur603203 India Srm Institute of Engineering and Technology Department of Electronics and Communication Engineering Tiruchirapalli India Dhanalakshmi Srinivasan Arts and Science College Ecr Mamallapuram Chennai India
Deep Learning is used for predicting a large volume of data sets in the medical field particularly for breast cancer prediction and diagnosis. The most effective and broadly applied model for detecting breast cancer i... 详细信息
来源: 评论
Fortifying Database Security: Integrating Advanced Honeypot Technology for Resilient SQL Injection Defense
Fortifying Database Security: Integrating Advanced Honeypot ...
收藏 引用
2024 International Conference on Communication, Computer sciences and engineering, IC3SE 2024
作者: Kumaran, U. Swetha, Thammisetty Reddy, G. S. N. Santhosh Ala, Harini Nagarajan, Senthil Murugan Umah, B. Amrita School Of Computing Department Of Computer Science & Engineering Amrita Vishwa Vidyapeetham Bengaluru India Andhra Pradesh Madanapalle India Amrita School Of Engineering Amrita Vishwa Vidyapeetham Department Of Electronics And Communication Engineering Karnataka Bengaluru India University Of Luxembourg Department Of Mathematics Faculty Of Science Technology And Medicine L-4365 Luxembourg Amrita School Of Engineering Amrita Vishwa Vidyapeetham Department Of Computer Science & Engineering Karnataka Bengaluru India
The dynamic nature of cyber threats necessitates the development of novel approaches to strengthen database system security. The novel method for fortifying defenses against SQL injection attacks - a pervasive and ong... 详细信息
来源: 评论
Enhancing Medical Image Diagnosis with Convolutional Neural Networks  2
Enhancing Medical Image Diagnosis with Convolutional Neural ...
收藏 引用
2nd IEEE International Conference on Advances in Information Technology, ICAIT 2024
作者: Mahadevan, K. Pushparani, S. SashiRekha, K. Sivagami, V.M. Usharani, R. Department of Computer Science and Engineering CARE College of Engineering Tamil Nadu Trichy India Department of Computer Science and Engineering Meenakshi College of Engineering Tamil Nadu Chennai India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India Department of Information Technology Sri Venkateswara College of Engineering Tamil Nadu Chennai India Department of Computational Intelligence School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai India
This paper is a comparative analysis of medical image diagnosis algorithms with Convolutional Neural Networks (CNNs) and other methods;such as Support Vector Machine (SVM), Random Forest, and k-nearest Neighbors (k-NN... 详细信息
来源: 评论
Extended Kalman Filter Algorithm to Detect False Data Injection in Wireless Sensor Network  2
Extended Kalman Filter Algorithm to Detect False Data Inject...
收藏 引用
2nd International Conference on Augmented Intelligence and Sustainable Systems, ICAISS 2023
作者: Babuji, R. Ganesan, J. Jeya Lekha, D. Karthikeyan, M. Kalai Selvi, D.M. Rmk Engineering College Department of Electronics and Communication Engineering Tamil Nadu Chennai India Sri Sairam Institute of Technology Department of Artificial Intelligence and Data Science Tamil Nadu Chennai India Rmk College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Srm Institute of Science and Technology School of Computing Faculty of Engineering and Technology Department of Computing Technologies Tamil Nadu Chennai India R.M.D. Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai India
Wireless Sensor Networks (WSN) contains spatially distributed sensor nodes that collaborate with each other. However, the WSN is susceptible since the wireless medium is unpredictable. Several conventional approaches ... 详细信息
来源: 评论
Multimodal Deep Representation Learning for Quantum Cross-Platform Verification
收藏 引用
Physical Review Letters 2024年 第13期133卷 130601页
作者: Yang Qian Yuxuan Du Zhenliang He Min-Hsiu Hsieh Dacheng Tao School of Computer Science Faculty of Engineering College of Computing and Data Science JD Explore Academy Beijing 101111 China *** Beijing 101111 China Taipei 114699 Taiwan
Cross-platform verification, a critical undertaking in the realm of early-stage quantum computing, endeavors to characterize the similarity of two imperfect quantum devices executing identical algorithms, utilizing mi... 详细信息
来源: 评论